Systems and methods for the prevention of unauthorized use and manipulation of digital content
First Claim
1. A method for preventing unauthorized use of digital content data in a computer system comprising:
- examining system devices that are operational in the computer system to determine features of hardware included in the system devices;
determining whether the computer system is a virtual machine or emulation;
generating a signature unique to the computer system based on the features of the hardware included in the system devices of the computer system;
encrypting the digital content data using the signature unique to the computer system based on the features of the hardware included in the system devices, wherein the encrypted digital content is specific to the computer system; and
preventing distribution of the digital content to the computer system if the computer system is determined to be a virtual machine or emulation.
3 Assignments
0 Petitions
Accused Products
Abstract
A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved.
234 Citations
16 Claims
-
1. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
examining system devices that are operational in the computer system to determine features of hardware included in the system devices; determining whether the computer system is a virtual machine or emulation; generating a signature unique to the computer system based on the features of the hardware included in the system devices of the computer system; encrypting the digital content data using the signature unique to the computer system based on the features of the hardware included in the system devices, wherein the encrypted digital content is specific to the computer system; and preventing distribution of the digital content to the computer system if the computer system is determined to be a virtual machine or emulation. - View Dependent Claims (2, 3, 4, 5, 6, 11, 12)
-
-
7. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
requesting an installation of the digital content data at a client; examining system devices of the client that are operational in the client to determine features of hardware included in the system devices of the client; determining whether the client is a virtual machine or emulation; generating a signature representative of the client based on the features of the hardware included in the system devices of the client; transmitting the request for installation to a server, said request including the signature; verifying, at the server, whether the requested installation is authorized, if the installation is unauthorized, transmitting an installation denial message to the client, and if the installation is authorized, transmitting an installation authorization message to the client; installing the digital content data at the client if the requested installation is authorized; and preventing distribution of the digital content to the client if the client is determined to be a virtual machine or emulation. - View Dependent Claims (8, 13, 15)
-
-
9. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
requesting use of the digital content data at a client; examining system devices of the client that are operational in the client to determine features of hardware included in the system devices of the client; determining whether the client is a virtual machine or emulation; generating a signature representative of the system based on the features of the hardware included in the system devices; transmitting the request for use to a server, said request including the signature; verifying, at the server, whether the requested use is authorized, if the installation is unauthorized, transmitting a use denial message to the client, and if the installation is authorized, transmitting a use authorization message to the client; utilizing the digital content data at the client if the requested installation is authorized; and preventing distribution of the digital content to the client if the client is determined to be a virtual machine or emulation. - View Dependent Claims (10, 14, 16)
-
Specification